Skip to main content

Shmoocon 2014

Shmoocon

Shmoocon 2014: Held in Washington D.C. from January 17-19, 2014, at the Washington Hilton. This collection contains all recorded main area talks at the event.

DIFFERENT - ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next...



rss RSS

42
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2014
movies

eye 12,712

favorite 7

comment 0

Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name...
Shmoocon 2014
by Lee Harrison and Kang Li
movies

eye 838

favorite 0

comment 0

Arms Race: The Story of (In)-Secure Bootloaders Lee Harrison and Kang Li Secure boot is the process that ensures the critical parts of software (e.g. kernel) running on a device are authorized and have not been tampered with. Many wireless service providers prefer to have a locked down version of their smartphones that can only boot the official kernel, and do not allow loading customized systems developed by users. This results in an arms race between the smartphone vendors and the users that...
Shmoocon 2014
by Jake Williams and Alissa Torres
movies

eye 477

favorite 0

comment 0

ADD -- Complicating Memory Forensics Through Memory Disarray Jake Williams and Alissa Torres In this presentation, we'll present ADD (attention deficit disorder), a tool that litters Windows physical memory with (configurable amounts and types of) garbage to disrupt memory forensics. Memory forensics has become so mainstream that it's catching too many malware authors during routine investigations (making Jake a sad panda). If memory forensics were much harder to perform, then attackers would...
Shmoocon 2014
movies

eye 390

favorite 0

comment 0

The "Science of Cyber" and the Next Generation of Security Tools Paulo Shakarian Governments around the world are investing heavily in the so called "science of cyber" in order to create a rigorous scientific base for the next generation of security tools. But what's going on in the walled-off world of academia? Will this new science eventually lead to more improved security in cyber space? In this talk, I will describe three ongoing projects at West Point in collaboration...
Shmoocon 2014
by Shmoocon Organizers and Friends
movies

eye 168

favorite 0

comment 0

Closing ceremonies for ShmooCon 2014, including organizer statements, contest results, calls for volunteers and assistance, overview of the con's performance, and highlights from the events of the weekend.
Shmoocon 2014
movies

eye 340

favorite 0

comment 0

Genuinely "Trusted Computing:" Free and Open Hardware Security Modules Ryan Lackey "Trusted Computing" unfortunately often means trusting a black box provided by a third party who may not be particularly trustworthy. We present an alternative -- a user assembled hardware security module, based on a published design, using simple components which can be fully inspected by the user prior to assembly and commissioning. Ryan Lackey has 20 years of experience computer security,...
Shmoocon 2014
by Tarah Wheeler Van Vlack and Liz Dahlstrom
movies

eye 197

favorite 0

comment 0

Syncing Mentorship Between Winners And Beginners Tarah Wheeler Van Vlack and Liz Dahlstrom Mentorship in technology is broken. Many minorities feel unwelcome in tech. The number of women in technology is actually decreasing. The only solution which is proven to increase positive outcomes is mentorship. Unfortunately, winners in tech either don't realize their help is needed or don't know how to get started. Beginners are often afraid to ask for help or don't know where to find it. We at Hack...
Shmoocon 2014
movies

eye 506

favorite 0

comment 0

Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms Jaime Sanchez and Pablo San Emeterio Global surveillance emerged as a phenomenon since the late 1940s and Internet and mobile technology are being developed with such pace that it is impossible to guarantee electronic privacy and nobody should expect it. How strong are the actual Instant Messaging Platforms? Do they take care of our security and privacy? We'll look inside the security of several...
Shmoocon 2014
movies

eye 253

favorite 0

comment 0

Technology Law Issues for Security Professionals Shannon Brown An emerging gap exists between the demands of today's technology systems, the necessity for computer security research, and the reality of the law. The potential tension between these elements poses a challenge especially for computer security researchers--some who might be misunderstood or who may unintentionally run afoul a myriad of complex laws with potentially breathtaking penalties. In plain language, this presentation raises...
Shmoocon 2014
by Davi Ottenheimer and Allison Miller
movies

eye 188

favorite 0

comment 0

Data Whales and Troll Tears: Beat the Odds in InfoSec Davi Ottenheimer and Allison Miller The rising scale and complexity of IT is creating ever more opportunities for abuse and attack. Many for years have warned we face a losing race if we rely on patch and mend. Others for years have advocated using a threat-based priority system. Is there room to consider a middle path or can we prove with science the existence of a third wave? This data-intensive presentation highlights real-world examples...
Shmoocon 2014
by Benjamin Gatti
movies

eye 703

favorite 0

comment 0

"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age Benjamin Gatti In the darkest days of WWII, a small team assembled at Bletchley Park solved two problems and set a new course for computers and cryptography - fast computers, and secure communications can both be traced back to one of the ugliest estates in London suburbia, where Alan Turing, Max Newman, Tommy Flowers, and others hacked their way through...
Shmoocon 2014
by Christopher Truncer, Will Schroeder, and Michael Wright
movies

eye 1,513

favorite 0

comment 0

AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
Shmoocon 2014
by Various
movies

eye 204

favorite 0

comment 0

ShmooCon FireTalks are 15 minute presentations meant to be an alternative to the traditional 30 to 90 minute conference format. Similar to 5 minute Lightning Talks, the purpose is to challenge speakers to skip the BS and instead dive right into the core of their content in a more relaxed alternative environment. Unlike Lightning Talks, which are usually performed in rapid succession, the additional time allows the speaker to follow a more traditional introduction, body, and conclusion format....
Shmoocon 2014
by Christopher Truncer, Will Schroeder, and Michael Wright
movies

eye 197

favorite 0

comment 0

AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
Shmoocon 2014
movies

eye 276

favorite 0

comment 0

Operationalizing Threat Information Sharing: Beyond Policies and Platitudes Sean Barnum and Aharon Chernin Threat intelligence sharing is a hot topic of conversation today that already affects or soon will affect most of us in the infosec community. Like most hot topics this tends to generate a lot of cliched buzzworditis and well-meant but unrealistic policy. Cue the shmooballs! But what does it take to move beyond just talking about cyber threat intelligence sharing and making it an...
Shmoocon 2014
by Joshua Schroeder and Spencer Brooks
movies

eye 369

favorite 0

comment 0

CCTV: Setup, Attack Vectors, and Laws Joshua Schroeder and Spencer Brooks Ever wonder how to setup a CCTV Digital Video Recording security system? This talk will show how to do that, as well as key factors like attack vectors and recording laws. First, we will go over basic setup on how we planned out this project and current price points for entry. This will include things to be mindful of such as camera quality, disk space and other features. In the second part, we will cover attack vectors...
Shmoocon 2014
by Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres
movies

eye 337

favorite 0

comment 0

Closing Plenary: Large Scale Network and Application Scanning Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres From proff's strobe to modern day distributed network scanners, probing remote systems and applications to assess a system's security posture is a core part of our offensive and defensive tool kits. This panel discussion will examine the state of the art of network and application scanning. During the session, the entire Internet will be...
Shmoocon 2014
by Hendrik Schmidt and Brian Butterly
movies

eye 332

favorite 0

comment 0

LTE vs. Darwin Hendrik Schmidt and Brian Butterly Whether believing in Darwin or not, the Darwin-Award states an important fact of mankind, technology and probably everything that exists: You only make certain mistakes once. For mankind this usually implies taking oneself out of the gene pool, for companies it can mean to vanish of the market and for technology, well, early death. So when looking at "Long Term Evolution," providers need to implement proposed features properly and work...
Shmoocon 2014
by Xeno Kovah, Corey Kallenberg, and John Butterworth
movies

eye 376

favorite 1

comment 0

Timing-Based Attestation: Sexy Defense, or the Sexiest? Xeno Kovah, Corey Kallenberg, and John Butterworth What if I told you it's possible to ask a drunk person if he's drunk - and get an accurate answer, by measuring the reaction time? What if I told you it's possible to design security software under the assumption that the attacker has the same privileges as the defender, and the attacker can scribble over and modify the defender's code as much as he wants, but he'll still get caught? This...
Shmoocon 2014
by Scott Moulton
movies

eye 373

favorite 0

comment 0

You Don't Have the Evidence Scott Moulton Forensic imaging tools have one purpose, to soundly copy every sector on a device to a destination device and report success or failure without changing data. In the last 20 years most forensic imaging tools have not progress and continue to use the same basic code for imaging a drive. When encountering damage many of the tools have no ability to deal with the damage and quit, crash, or worse; do more damage to the drive they are trying to recover from....
Shmoocon 2014
movies

eye 382

favorite 0

comment 0

Keynote Address: Privacy Online: What Now? Ian Goldberg Recent revelations about data and metadata collection of Internet users' communications have been extremely worrying. Not only are governments collecting this information, but online service providers, including cloud providers, are part of the picture as well. What can we, as individuals, do to limit the collection of our online messages, friends lists, and usage patterns? In this talk, we will look at existing and upcoming privacy...
Shmoocon 2014
by Bruce and Heidi Potter
movies

eye 331

favorite 0

comment 0

ShmooCon 2014 - Opening Remarks Rumblings and Rants
Shmoocon 2014
by Dominic Spill and Michael Ossmann
movies

eye 360

favorite 0

comment 0

Unambiguous Encapsulation - Separating Data and Signaling Dominic Spill and Michael Ossmann Attacks against in band signaling systems have been demonstrated against Zigbee and Ethernet in the past few years. In many ways these are similar to memory corruption attacks as both rely on data being interpreted as meta-data by the target system. We have built tools to generate sets of error correcting codes that can be used to prevent untrusted user supplied data from being interpreted as meta-data...
Shmoocon 2014
by Branden Miller (f0zzie) and Emily Miller (ch1cken)
movies

eye 242

favorite 0

comment 0

How Hackers for Charity (Possibly) Saved Me a Lot of Money Branden Miller (f0zzie) and Emily Miller (ch1cken) What do you do when your oldest child tells you she wants to be an artist? If you are me you panic under the weight of the idea that you will be supporting your kid for life! Then you use her determination to help others as a motivator and gently (re)focus her onto technology. After 20 years in the Navy, f0zzie became a Senior Security Analyst in the Healthcare industry. He is a family...
Shmoocon 2014
movies

eye 1,383

favorite 0

comment 0

An Open and Affordable USB Man in the Middle Device Dominic Spill With the introduction of FaceDancer, there has been a surge of interest in USB security. USBProxy is an open framework for the BeagleBone Black to make it simpler for anyone to monitor, inject or modify data carried over a USB connection. While the FaceDancer will allow devices to be written on a host system, we are able to go further and man-in-the-middle connections to existing devices as well. The BeagleBone Black also enables...
Shmoocon 2014
movies

eye 414

favorite 0

comment 0

Introducing DARPA's Cyber Grand Challenge Mike Walker Could a purpose-built supercomputer play DEFCON capture the flag? Mike Walker joined DARPA as a Program Manager in January 2013. His research interests relate to machine reasoning about software in situ and the automation of application security lifecycles. Mr. Walker has extensive industry experience. Prior to joining DARPA he worked as a security software developer, enterprise security architect, and research lab leader.
Shmoocon 2014
by Aaron Beuhring and Kyle Salous
movies

eye 487

favorite 0

comment 0

Raising Costs for Your Attackers Instead of Your CFO Aaron Beuhring and Kyle Salous Everyone knows that blacklisting is not effective and that whitelisting is a better solution, so why isn't anyone doing it? Organizations continue to spend money on the latest technologies in hopes that if they spend enough they will somehow become secure. Chances are that that these same organizations already own technology that can provide far more powerful defense than new blinking boxes but just haven't...
Shmoocon 2014
by Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy
movies

eye 200

favorite 0

comment 0

Malicious Online Activities Related to the 2012 U.S. General Election Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy This presentation looks back at the number of ways that the 2012 Presidential election was bought, sold, and manipulated through malicious online activities. We identify activities that could be classified as manipulative, mischievous, or downright illegal, such as fake campaign donation sites, political spam, attempts to sell ballots, privacy...
Shmoocon 2014
by Rob "Mubix" Fuller
movies

eye 918

favorite 0

comment 0

Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares Rob "Mubix" Fuller This talk is about protections, mitigations, or detection mechanisms that I’ve seen across businesses big and small that were innovative and highly effective, yet free (or mostly free) and stopped me (as an attacker) dead in my tracks. We will be going over 11 (or a many as we can get to) methods, tactics, and software setups that will cut down intrusions significantly. Changes that you...
Shmoocon 2014
movies

eye 654

favorite 1

comment 0

Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process communication, network communications, and user input handling as seen in real-world applications. To assist the community in assessing security risks of mobile apps, we introduce a new tool called 'idb' and show how it can be...
Shmoocon 2014
by Daniel J. Bernstein and Tanja Lange
movies

eye 950

favorite 0

comment 0

SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography Daniel J. Bernstein and Tanja Lange There are several different standards covering selection of curves for use in elliptic-curve cryptography (ECC). Each of these standards tries to ensure that the elliptic-curve discrete-logarithm problem (ECDLP) is difficult. ECDLP is the problem of finding an ECC user's secret key, given the user's public key. Unfortunately, there is a gap between ECDLP difficulty and ECC security. None of...
Shmoocon 2014
movies

eye 724

favorite 0

comment 0

Vehicle Forensics - The Data Beyond the Dashboard Courtney Lancaster With vehicle technologies constantly evolving, it is important to understand the threat to the consumer that leaves personal data behind, as well as the benefit to the investigator and how accessible this data can be. Infotainment systems are being rolled out into almost every new vehicle that is manufactured today. The art of mastering the hard drive, as well as a multitude of other components, has already occurred. Now,...
Shmoocon 2014
by Mike Sconzo and Brian Wylie
movies

eye 383

favorite 1

comment 0

Practical Applications of Data Science in Detection Mike Sconzo and Brian Wylie It seems recently offensive tactics, exploits and vulnerabilities are getting all the Info Sec sexy-points. We're going to try and swing this back towards detection as we apply some new-fangled math and techniques to solve some existing problems and tackling new ones. We'll take Data Science off its pedestal and show how, with problem and data understanding you can apply different techniques to make analysis more...
Shmoocon 2014
by Bruce Schneier
movies

eye 689

favorite 1

comment 0

The NSA: Capabilities and Countermeasures Bruce Schneier Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on...
Shmoocon 2014
movies

eye 240

favorite 0

comment 0

Dissipation of Hackers in the Enterprise Weasel From the early days of the InfoSec industry to today there has been a constant seeping of deep-knowledge technologists into a slew of disciplines that are not primarily focused on the protection of enterprise assets. This dialog will explore and question the contributors to the diminishing attractiveness of the enterprise as a logical career path for hackers. We will go over data that shows that shift from enterprises being a primary employer for...
Shmoocon 2014
texts

eye 216

favorite 0

comment 0

Shmoo 2014 Vids List.
Topics: tracker, video, data, hackers, cryptography, forensics, defenses, usb, kang, miller, video...
Shmoocon 2014
by David Giametta and Andrew Potter
movies

eye 299

favorite 0

comment 0

A Critical Review of Spatial Analysis David Giametta and Andrew Potter Spatial Analysis is a recently proposed idea of using static analysis based byte sequences characterized by statistical features fused and graphed into 2-D grids where new exploitable information is obtained. The new information is the spatial structure similarity of byte sequences located with files believed to be similar and related. The structure is generated using simple fixed size sliding windows moving along the byte...
Shmoocon 2014
by Various
movies

eye 242

favorite 0

comment 0

ShmooCon FireTalks are 15 minute presentations meant to be an alternative to the traditional 30 to 90 minute conference format. Similar to 5 minute Lightning Talks, the purpose is to challenge speakers to skip the BS and instead dive right into the core of their content in a more relaxed alternative environment. Unlike Lightning Talks, which are usually performed in rapid succession, the additional time allows the speaker to follow a more traditional introduction, body, and conclusion format....
Shmoocon 2014
by The Shmoo Group
movies

eye 216

favorite 0

comment 0

0wn the Con The Shmoo Group For ten years we've chosen to stand up and share all the ins and outs and inner workings of the con. Why stop now? Join us to get the break down of budget, an insight to the CFP process, a breakdown of the hours it takes to put on a con like ShmooCon and anything thing else you might want to talk about. This is an informative, fast paced and generally fun session as Bruce dances on stage, and Heidi tries to hide from the mic. Seriously though--if you ever wanted to...
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things! Nicholas Popovich This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope. This will be a discussion of a recent independent research project that eventually led to an information disclosure vulnerability by a major U.S. ISP. This is also an example of when a...
Shmoocon 2014
movies

eye 286

favorite 0

comment 0

How to Train your Snapdragon: Exploring Power Frameworks on Android Josh "m0nk" Thomas Have you ever wondered how power is routed around your phone, how it is stored and if it could be made dangerous? I have, and I somehow talked the DARPA Cyber Fast Track group into funding my research into the subject and allowing me to name it: "Project Burner: El Telefono Inteligente de Fuego." The overall goal of the project was: "Can I catch a phone on fire using nothing but the...
Shmoocon 2014
movies

eye 397

favorite 1

comment 0

Security Analytics: Less Hype, More Data Aaron Gee-Clough There has been a lot of talk in the industry recently about "analytics" and getting security data from non-security logs. The problem is, very few people are talking about which analysis techniques are actually useful. This talk will look at a few log types and talk through analytics techniques that can be applied to each. For each technique, I'll talk about what it assumes and how it succeeds or fails when using real-world...